{"id":39189,"date":"2014-11-12T17:31:27","date_gmt":"2014-11-13T01:31:27","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=39189"},"modified":"2025-08-17T20:17:43","modified_gmt":"2025-08-18T03:17:43","slug":"bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/","title":{"rendered":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day"},"content":{"rendered":"<p><em>This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-060\">MS14-060<\/a> patch bypass. Check out <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/bypassing-microsofts-patch-sandworm-zero-day-root-cause\">the first part here.<\/a><\/em><\/p>\n<h2><strong>Microsoft&#8217;s Patch<\/strong><\/h2>\n<p>From our previous analysis we\u2019ve learned that the core of this threat is its ability to effectively right-click a file. Now, let&#8217;s see what Microsoft did in its patch MS14-060.<\/p>\n<p>With a little bit of help from patch diffing, we can easily spot that the function <em>MarkFileUnsafe()<\/em> is called right after the malicious file is dropped into the temp folder. The following image shows the call:<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39047\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1.png\" alt=\"\" width=\"985\" height=\"524\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1.png 985w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1-300x159.png 300w\" sizes=\"auto, (max-width: 985px) 100vw, 985px\" \/><\/a><em>MarkFileUnsafe() is called right after dropping the file into the temp folder.<\/em><\/p>\n<p>There are two ways that an attacker can drop a file into the temp folder. Researchers have seen real in-the-wild samples of both. The first way is to copy from a UNC location, such as <a href=\"https:\/\/www.virustotal.com\/en\/file\/70b8d220469c8071029795d32ea91829f683e3fbbaa8b978a31a0974daee8aaf\/analysis\">in this sample<\/a> <em>(SHA1: 22fbbcfa5646497e57ee238a180d1b367789984a).<\/em> The second is to drop it directly from the embedded OLE stream, as <a href=\"https:\/\/www.virustotal.com\/en\/file\/e99f089bf209d5caea948f424881cbf6652658b973a5b97dbb59db6e03e8c907\/analysis\">in this sample<\/a> <em>(SHA1: cb2aadbfcfac3c5802ff23ae6971791549b120b8)<\/em>. Our research also shows that the two ways are represented by several code flows. Thus, there have to be (and we have seen them in the updated packager.dll) several places calling the <em>MarkFileUnsafe() <\/em>function.<\/p>\n<p>Now, let&#8217;s take a look at what <em>MarkFileUnsafe()<\/em> does. The function calls the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ie\/ms537032%28v=vs.85%29.aspx\">IZoneIdentifier<\/a> APIs to mark the dropped file as coming from the Internet zone (&#8220;URLZONE_INTERNET&#8221;). At a low level, the function leverages a feature in NTFS. (If you&#8217;d like more details on how this works, refer to these links <a href=\"http:\/\/mikehadlow.blogspot.com\/2011\/07\/detecting-and-changing-files-internet.html\">1<\/a>, <a href=\"https:\/\/blogs.msdn.com\/b\/oldnewthing\/archive\/2013\/11\/04\/10463035.aspx\">2.<\/a>) We call this feature Internet marked.<\/p>\n<p>After a file is Internet marked, users will receive a warning dialog whenever they try to &#8220;execute&#8221; the file. This blocks automatic code execution. For example, installing an Internet-marked .inf file will bring up the following dialog, which is exactly what we saw when testing the original zero-day sample with Microsoft\u2019s patch MS14-060:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning_dialog1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39055\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning_dialog1.png\" alt=\"\" width=\"414\" height=\"299\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning_dialog1.png 414w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning_dialog1-300x216.png 300w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><\/a><em>Warning dialog when a user tries to \u201cexecute\u201d the Internet-marked .inf file.<\/em><\/p>\n<h2><strong>Problem with the patch<\/strong><\/h2>\n<p>An &#8220;execute&#8221; action will be blocked by the Internet-marked feature because the Windows Shell routines will check the Security Zone when performing an\u00a0\u201cexecute\u201d action. However, a\u00a0&#8220;non-execute&#8221; action will go through directly. This is the same reason that we can&#8217;t directly run an executable downloaded through Internet Explorer, but we can open a downloaded Word document with Office.<\/p>\n<p>Let\u2019s consider the potential problems:<\/p>\n<ul>\n<li>On Windows, there are many file types (filename extensions). They are registered by various applications on the system. Taking the same action with right-click pop-up menus basically allows you or a command to run various applications or perform various actions on the system.<\/li>\n<li style=\"text-align: left;\">The registered actions also vary. They can include opening the file, often with the keyword &#8220;edit,&#8221; as well as many other actions. For example, you can unzip a .zip file when WinRar is installed (see the following image), regardless whether the .zip is Internet marked. It all depends on which extension you choose and which applications you have installed.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_zip1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39049\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_zip1.png\" alt=\"\" width=\"290\" height=\"345\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_zip1.png 290w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_zip1-252x300.png 252w\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" \/><\/a><em>The \u201cright-click\u201d menu for a .zip file.<\/em><\/p>\n<p>You can see why we were already worried at this stage: Allowing unexpected applications to run is not acceptable from a security point of view because no one knows whether launching an \u201cunknown\u201d application will cause a problem.<\/p>\n<h2><strong>Exploiting the problem: a real-world example<\/strong><\/h2>\n<p>The proof of concept we sent to Microsoft leverages Python on Windows. When we right-click on a .py file, we get this menu:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/py_menu1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39050\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/py_menu1.png\" alt=\"\" width=\"290\" height=\"299\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/py_menu1.png 290w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/py_menu1-32x32.png 32w\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" \/><\/a><em>The \u201cright-click\u201d menu for .py file<\/em><\/p>\n<p>Thus we can call the Python development tool IDLE to open a .py file with the <em>iVerb<\/em> set to 3, as in the original sample. (See <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/bypassing-microsofts-patch-sandworm-zero-day-root-cause\">part one of this post <\/a>for a discussion of <em>iVerb<\/em> and other details.) Because this is just an \u201cedit\u201d action, even with an Internet-marked file, the command will run without any warning. Now, let&#8217;s see what happens when IDLE runs. We use Process Monitor to record the following events:<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/process_python2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39198\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/process_python2.png\" alt=\"\" width=\"518\" height=\"96\" \/><\/a><\/p>\n<p>It seems that IDLE tried to load a Python module named tabnanny in the same directory as the .py file. This interested us. So we created tabnanny.py and test.py in the same directory. When opening test.py with IDLE (through right-clicking), the code inside tabnanny.py was automatically executed!<\/p>\n<p>As we have mentioned, the first security issue in packager.dll is allowing it to drop arbitrary files into the temp folder. By embedding more Packager objects on a PowerPoint slide, we can drop many files into the temp folder when a PowerPoint Show slide is viewed. Thus we can drop the first file with the special filename tabnanny.py. When the second .py file, with any filename, is opened by IDLE, the Python code in tabnanny.py will immediately be executed.<\/p>\n<p>The environment is Windows 7 with Office 2010 and Python 2.7.8 installed, all are updated after the October patch (with MS14-060 installed) but before the November 11 patch.<\/p>\n<p>Even though we ran the exploit in an environment with third-party software installed, considering the large number of file types on default Windows as well as various &#8220;non-execute&#8221; actions for these file types, there is a good chance that attackers can develop exploits for the default setup.<\/p>\n<h2><strong>A look at the partial bypass<\/strong><\/h2>\n<p>The preceding exploitation method was the one we showed to Microsoft. As we have mentioned at the beginning of this post, there is an in-the-wild sample that is claimed to also bypass the patch. We\u2019ve obtained <a href=\"https:\/\/www.virustotal.com\/en\/file\/e99f089bf209d5caea948f424881cbf6652658b973a5b97dbb59db6e03e8c907\/analysis\">that sample<\/a> <em>(SHA1: cb2aadbfcfac3c5802ff23ae6971791549b120b8)<\/em>. Let&#8217;s see how it works.<\/p>\n<p>This sample drops an .exe file into the temp folder, and also selects the second item on the right-click menu (via cmd=3). What&#8217;s the second item for an .exe on Windows?<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_exe1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-39048\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_exe1.png\" alt=\"\" width=\"307\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_exe1.png 307w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/menu_exe1-268x300.png 268w\" sizes=\"auto, (max-width: 307px) 100vw, 307px\" \/><\/a><em>The right-click menu for a Windows .exe file.<\/em><\/p>\n<p>Now, we see that the exploit performs &#8220;Run as administrator.&#8221; This won\u2019t trigger the Internet-mark warning dialog because it triggers another dialog: a user account control dialog will show up when the UAC is not disabled for a standard user account.<\/p>\n<h2><strong>Concerns remain<\/strong><\/h2>\n<p>Microsoft has finally resolved this serious vulnerability with <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-064\">MS14-064.<\/a> Users should apply the patch as soon as possible. As we have pointed out in previous sections, the vulnerability actually consists of two security issues: the \u201cdropping arbitrary file into temp folder\u201d issue and the \u201ccode execution through <em>DoVerb()\u201d<\/em> issue. However, according to our test against the new patch, only the latter was fixed; the \u201cdropping arbitrary file into temp folder\u201d issue remains. We recommend that Microsoft resolve this security issue as well.<\/p>\n<p>Users who have concerns regarding the remaining issue may consider the workaround and mitigations provided in <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/dropping-files-temp-folder-raises-security-concerns\/\">our July post.<\/a><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>In this post we provided in-depth research around the Sandworm vulnerability CVE-2014-4114, which includes a thorough understanding of the root cause, the exploitation, the patching methodology, as well as the patch bypassing that leads to CVE-2014-6352. We demonstrated a real-world bypass that leverages an issue in Python IDLE.<\/p>\n<p>The key problem of the patch is that it blocks only a small number of actions of the right-click menu involved with direct execution. However, other actions, such as the most popular&#8211;\u201cediting\u201d with a registered application&#8211;are still allowed. This interoperability opens a door for attackers for future exploitation.<\/p>\n<p>This interesting case study highlights that interoperability between applications raises complexity. Security is no longer about a single application. Understanding the behaviors of various applications and how they work together is vital for effective security.<\/p>\n<p><em>Thanks to my colleagues Bing Sun, Chong Xu, Stanley Zhu (all of McAfee Labs), and Xiaoning Li\u00a0(McAfee) for their help with this analysis.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out&#8230;<\/p>\n","protected":false},"author":610,"featured_media":161731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[1411,1814,338,180],"coauthors":[2524],"class_list":["post-39189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-advanced-persistent-threats","tag-computer-security","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-13T01:31:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T03:17:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"985\" \/>\n\t<meta property=\"og:image:height\" content=\"524\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Haifei Li\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Haifei Li\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\"},\"author\":{\"name\":\"Haifei Li\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fd18845cc3f27ed398648df8cc802444\"},\"headline\":\"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day\",\"datePublished\":\"2014-11-13T01:31:27+00:00\",\"dateModified\":\"2025-08-18T03:17:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\"},\"wordCount\":1287,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png\",\"keywords\":[\"advanced persistent threats\",\"computer security\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\",\"name\":\"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png\",\"datePublished\":\"2014-11-13T01:31:27+00:00\",\"dateModified\":\"2025-08-18T03:17:43+00:00\",\"description\":\"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png\",\"width\":622,\"height\":308},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fd18845cc3f27ed398648df8cc802444\",\"name\":\"Haifei Li\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/88c52c07fcacd190468a32af554e5f36\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49ae79ecae2f1bff04cb595e12d9cc72?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49ae79ecae2f1bff04cb595e12d9cc72?s=96&d=mm&r=g\",\"caption\":\"Haifei Li\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/haifeili\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/haifei-li\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog","description":"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog","og_description":"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-11-13T01:31:27+00:00","article_modified_time":"2025-08-18T03:17:43+00:00","og_image":[{"width":985,"height":524,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/MarkFileUnsafe1.png","type":"image\/png"}],"author":"Haifei Li","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Haifei Li","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/"},"author":{"name":"Haifei Li","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fd18845cc3f27ed398648df8cc802444"},"headline":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day","datePublished":"2014-11-13T01:31:27+00:00","dateModified":"2025-08-18T03:17:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/"},"wordCount":1287,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png","keywords":["advanced persistent threats","computer security","endpoint protection","malware"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/","name":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png","datePublished":"2014-11-13T01:31:27+00:00","dateModified":"2025-08-18T03:17:43+00:00","description":"This is the\u00a0second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out the first part here.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/622x308_Blog_MicrosoftEdge.png","width":622,"height":308},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Bypassing Microsoft\u2019s Patch for the Sandworm Zero Day"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fd18845cc3f27ed398648df8cc802444","name":"Haifei Li","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/88c52c07fcacd190468a32af554e5f36","url":"https:\/\/secure.gravatar.com\/avatar\/49ae79ecae2f1bff04cb595e12d9cc72?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49ae79ecae2f1bff04cb595e12d9cc72?s=96&d=mm&r=g","caption":"Haifei Li"},"sameAs":["https:\/\/www.linkedin.com\/in\/haifeili\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/haifei-li\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/39189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=39189"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/39189\/revisions"}],"predecessor-version":[{"id":220043,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/39189\/revisions\/220043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/161731"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=39189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=39189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=39189"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=39189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}